From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates., , , , , и . ACM Conference on Computer and Communications Security, стр. 2489-2504. ACM, (2019)Measurement and Analysis of Online Social Networks, , , , и . (2007)A Measurement-driven Analysis of Information Propagation in the Flickr Social Network, , и . (2009)Utilizing Web Trackers for Sybil Defense., , , , и . ACM Trans. Web, 15 (2): 8:1-8:19 (2021)Ad Delivery Algorithms: The Hidden Arbiters of Political Messaging., , , , and . CoRR, (2019)Algorithms that "Don't See Color": Comparing Biases in Lookalike and Special Ad Audiences., , , , and . CoRR, (2019)Problematic Advertising and its Disparate Exposure on Facebook., , , , and . USENIX Security Symposium, page 5665-5682. USENIX Association, (2023)A large-scale analysis of deployed traffic differentiation practices., , , , and . SIGCOMM, page 130-144. ACM, (2019)BingeOn Under the Microscope: Understanding T-Mobiles Zero-Rating Implementation., , , , and . Internet-QoE@SIGCOMM, page 43-48. ACM, (2016)Measuring the Facebook Advertising Ecosystem., , , , , and . NDSS, The Internet Society, (2019)